In ad hoc networks every device is responsible for its own basic computer services, including packet routing, data forwarding, security, and privacy. Most of the protocols used in wired networks are not suitable for ad hoc networks, since they were designed for static environments with defined borders and highly specialized devices, such as routers, authentication servers, and firewalls. This dissertation concentrates on the achievement of privacy-friendly identifiersand anonymous communication in ad hoc networks. In particular, the objective is to offer means for better anonymous communication in such networks. Two research questions were formulated to address the objective: I. How to design proper and trusted privacy-friendly digital iden...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
Mobility changes anonymity: new passive threats in mobile ad hoc networks Privacy in mobile ad hoc n...
Abstract—Introducing node mobility into the network also introduces new anonymity threats. This impo...
In ad hoc networks every device is responsible for its own basic computer services, including packet...
In ad hoc networks every device is responsible for its own basic computer services, including packet...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As ...
Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2006Thesis (M.Sc.) -- ...
This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As ...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Internet and mobile communications have had a profound effect on today's society. New services are c...
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) d...
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) d...
Mobile Ad Hoc Network(MANET) is an infrastructure less network. Any node may enter or leave network ...
Privacy in mobile ad hoc networks has new semantics in addition tothe conventional notions for infra...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
Mobility changes anonymity: new passive threats in mobile ad hoc networks Privacy in mobile ad hoc n...
Abstract—Introducing node mobility into the network also introduces new anonymity threats. This impo...
In ad hoc networks every device is responsible for its own basic computer services, including packet...
In ad hoc networks every device is responsible for its own basic computer services, including packet...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As ...
Tez (Yüksek Lisans) -- İstanbul Teknik Üniversitesi, Fen Bilimleri Enstitüsü, 2006Thesis (M.Sc.) -- ...
This paper presents Chameleon, a novel anonymous overlay network for mobile ad hoc environments. As ...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Internet and mobile communications have had a profound effect on today's society. New services are c...
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) d...
Privacy and Security have emerged as an important research issue in Mobile Ad Hoc Networks (MANET) d...
Mobile Ad Hoc Network(MANET) is an infrastructure less network. Any node may enter or leave network ...
Privacy in mobile ad hoc networks has new semantics in addition tothe conventional notions for infra...
The Internet promises an ever-increasing variety of services available anytime, almost anywhere, to ...
Mobility changes anonymity: new passive threats in mobile ad hoc networks Privacy in mobile ad hoc n...
Abstract—Introducing node mobility into the network also introduces new anonymity threats. This impo...